Evolution of the McEliece Public Key Encryption Scheme

被引:4
|
作者
Bucerzan, Dominic [1 ]
Dragoi, Vlad [2 ]
Kalachi, Herve Tale [2 ,3 ]
机构
[1] Aurel Vlaicu Univ Arad, Dept Math & Comp Sci, Arad 310330, Romania
[2] Univ Rouen, UFR Sci & Tech, EA 4108, Lab LITIS, F-76800 St Etienne Du Rouvray, France
[3] Univ Yaounde I, Dept Math, Yaounde, Cameroon
关键词
Post-quantum cryptography; Coding theory; McEliece encryption scheme; SECRET PERMUTATION; TIMING ATTACK; CODES; CRYPTOSYSTEM; IMPLEMENTATION; EQUIVALENCE; SECURITY;
D O I
10.1007/978-3-319-69284-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays codebased cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [1] On the key-privacy issue of McEliece public-key encryption
    Yamakawa, Shigenori
    Cui, Yang
    Kobara, Kazukuni
    Hagiwara, Manabu
    Imai, Hideki
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2007, 4851 : 168 - +
  • [2] A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 240 - +
  • [3] A Modified McEliece Public Key Encryption System with a Higher Security Level
    Zhang, Ke
    Tomlinsin, Martin
    Ahmed, Mohammed Zaki
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 991 - 996
  • [4] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    WuhanUniversityJournalofNaturalSciences, 2012, 17 (03) : 223 - 228
  • [5] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [6] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [7] An efficient RSA public key encryption scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad A.
    Al-Fayoumi, Mustafa
    Jabbar, Haidar S.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 127 - +
  • [8] A Public Key Encryption Scheme for String Identification
    Ray, Indranil Ghosh
    Rajarajan, Muttukrishnan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 104 - 111
  • [10] An efficient incomparable public key encryption scheme
    Lee, Hyang-Sook
    Lim, Seongan
    INFORMATION SCIENCES, 2011, 181 (14) : 3066 - 3072